Tag: Privacy and Security

Displaying 1 - 20 of 45 results.

Pages

Filtering by content type: Plain Language Guidance

You just learned that your business experienced a data breach. Whether hackers took personal information from your corporate server, an insider stole customer information, or information was inadvertently exposed on your company’s website, you are probably wondering what to do next....
For businesses, the key to safeguarding sensitive information is to start with security. The Start with Security brochure and videos released in 2015 offer practical tips to take from the FTC’s 60+ data security cases.
The Fair Credit Reporting Act (FCRA) spells out rights for victims of identity theft, as well as responsibilities for businesses. Identity theft victims are entitled to ask businesses for a copy of transaction records — such as applications for credit — relating to the theft of their...
More than a thousand new apps are hitting the market each day.  In this fast-moving era of entrepreneurship and creativity, is security keeping up?  Apps and devices often rely on consumer data — including contact information, photos, and location to name a few — and can be vulnerable...
A continuación se listan algunos conceptos básicos de computación útiles para su compañía, incluso si usted es el único empleado. Si tiene empleados, capacítelos para que sigan estas recomendaciones. Si recolecta algún tipo de información de consumidores, también consulte nuestros...
Here are a few computer security basics to help your company, even if you’re the only employee. If you have employees, train them to follow these tips. If you collect any consumer information, also check out our advice about protecting personal information.
Does your business collect and share consumer health information? When it comes to privacy, you’ve probably thought about the Health Insurance Portability and Accountability Act (HIPAA). But did you know that you also need to comply with the Federal Trade Commission (FTC) Act? This...
Most companies keep sensitive personal information in their files—names, Social Security numbers, credit card, or other account data—that identifies customers or employees.This information often is necessary to fill orders, meet payroll, or perform other necessary business functions....
When is a tenant background screening company a “consumer reporting agency”?
When is an employment background screening company a “consumer reporting agency”?
Start with Security: A Guide for Business offers tips for any business wanting to implement sound data security. For health app developers, here’s tailored advice and additional questions to ask.
What Are the Laws? Which Laws Apply to My Mobile Heath App? Glossary
When managing your network, developing an app, or even organizing paper files, sound security is no accident. Companies that consider security from the start assess their options and make reasonable choices based on the nature of their business and the sensitivity of the information...
For savvy companies, keeping data secure is a day-to-day part of their business. They reduce the amount of sensitive information they collect in the first place, keep it secure if there’s a legitimate business need to maintain it, and dispose of it safely when they no longer need it....
A GUIDE FOR BUSINESS AND PARENTSAND SMALL ENTITY COMPLIANCE GUIDE(March 20, 2015:  FAQ M.1, M.4, and M.5 revised.  FAQ M.6 deleted)
Start with the fundamentals. Take advantage of what experts have already learned about security. Design your product with authentication in mind. Protect the interfaces between your product and other devices or services. Consider how to limit permissions. Take advantage of...
A joint publication of the Equal Employment Opportunity Commission and the Federal Trade Commission

Pages